{"title":"基于共轭扭根提取问题的数字签名方案","authors":"M. R. Valluri","doi":"10.1109/MCSI.2015.28","DOIUrl":null,"url":null,"abstract":"Digital signatures are important primitives for building secure systems and are widely used in internet and electronic commerce for authencation. The most famous digital signature schemes are based on either the intractability of the integer factorization problem or the discrete logarithmic problem over finite fields. With Shor's algorithm on a quantum computer, these problems become tractable. Hence developments of signature schemes which are not based on these problems are crucial for maintaining information security. This paper introduces the conjugate twisted root extraction problem, and proposes a digital signature scheme based on a group of 2 × 2 matrices over N-truncated one variable polynomials. Its security relies on the cojugate twisted e-th root extraction problem. We prove that an adversary cannot forge a signature on a document unless the adversary extracts the e-th root in this group. The performance and other security issues are also discussed.","PeriodicalId":371635,"journal":{"name":"2015 Second International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Digital Signature Scheme Based on the Conjugate Twisted Root Extraction Problem\",\"authors\":\"M. R. Valluri\",\"doi\":\"10.1109/MCSI.2015.28\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Digital signatures are important primitives for building secure systems and are widely used in internet and electronic commerce for authencation. The most famous digital signature schemes are based on either the intractability of the integer factorization problem or the discrete logarithmic problem over finite fields. With Shor's algorithm on a quantum computer, these problems become tractable. Hence developments of signature schemes which are not based on these problems are crucial for maintaining information security. This paper introduces the conjugate twisted root extraction problem, and proposes a digital signature scheme based on a group of 2 × 2 matrices over N-truncated one variable polynomials. Its security relies on the cojugate twisted e-th root extraction problem. We prove that an adversary cannot forge a signature on a document unless the adversary extracts the e-th root in this group. The performance and other security issues are also discussed.\",\"PeriodicalId\":371635,\"journal\":{\"name\":\"2015 Second International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-08-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Second International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MCSI.2015.28\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Second International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MCSI.2015.28","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Digital Signature Scheme Based on the Conjugate Twisted Root Extraction Problem
Digital signatures are important primitives for building secure systems and are widely used in internet and electronic commerce for authencation. The most famous digital signature schemes are based on either the intractability of the integer factorization problem or the discrete logarithmic problem over finite fields. With Shor's algorithm on a quantum computer, these problems become tractable. Hence developments of signature schemes which are not based on these problems are crucial for maintaining information security. This paper introduces the conjugate twisted root extraction problem, and proposes a digital signature scheme based on a group of 2 × 2 matrices over N-truncated one variable polynomials. Its security relies on the cojugate twisted e-th root extraction problem. We prove that an adversary cannot forge a signature on a document unless the adversary extracts the e-th root in this group. The performance and other security issues are also discussed.